COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist

H Salmani - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
This paper presents a novel hardware Trojan detection technique in gate-level netlist based
on the controllability and observability analyses. Using an unsupervised clustering analysis …

Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis

J He, Y Zhao, X Guo, Y Jin - IEEE Transactions on Very Large …, 2017 - ieeexplore.ieee.org
The hardware Trojan (HT) has become a major threat for the integrated circuit (IC) industry
and supply chain, and has motivated numerous developments of Trojan detection schemes …

Protection against hardware trojans with logic testing: Proposed solutions and challenges ahead

S Dupuis, ML Flottes, G Di Natale… - IEEE Design & …, 2017 - ieeexplore.ieee.org
Protection against Hardware Trojans with Logic Testing: Proposed Solutions and
Challenges Ahead Page 1 2168-2356 (c) 2017 IEEE. Personal use is permitted, but …

A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention

R Mukherjee, SR Rajendran… - Journal of Cryptographic …, 2022 - Springer
Hardware Trojans have emerged as a great threat to the trustability of modern electronic
systems. A deployed electronic system with one or more undetected Hardware Trojan …

Locating hardware trojans using combinatorial testing for cryptographic circuits

L Kampel, P Kitsos, DE Simos - IEEE Access, 2022 - ieeexplore.ieee.org
This paper presents a novel method for locating combinational hardware Trojans (HT)
based on fault location approaches used in combinatorial testing. This method relies …

Adding security to networks-on-chip using neural networks

K Madden, J Harkin, L McDaid… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Modern computing systems are using Networkson-Chip (NoCs) for scalable on-chip
communications. Traditional security attacks have focused on the computing cores however …

[PDF][PDF] Combinatorial methods in security testing

DE Simos, R Kuhn, AG Voyiatzis, R Kacker - Computer, 2016 - artemiosv.info
National Institute of Standards and Technology; j. voas@ ieee. org little bene t beyond
testing four-to six-way combinations. The e ectiveness of any software testing technique …

Thermal sensor based hardware Trojan detection in FPGAs

L Pyrgas, F Pirpilidis, A Panayiotarou… - … Conference on Digital …, 2017 - ieeexplore.ieee.org
This paper introduces an efficient technique for the detection of malicious hardware, based
on thermal sensors. Each sensor consists of a Ring Oscillator with three inverters, a control …

An efficient multi-parameter approach for FPGA hardware Trojan detection

AP Fournaris, L Pyrgas, P Kitsos - Microprocessors and Microsystems, 2019 - Elsevier
Hardware Trojan (HT) detection in the wild is a challenging endeavor since the inspector
cannot have access to “golden chips” or special and trusted test measurements in order to …

An efficient triggering method of hardware Trojan in AES cryptographic circuit

X Chuan, Y Yan, Y Zhang - 2017 2nd IEEE International …, 2017 - ieeexplore.ieee.org
The cryptographic chip is widely used in government, military, finance, business and other
fields, so the requirement of security is very high. The globalization of the integrated circuit …